Comptia A+ Acronyms Flashcards

(79 cards)

1
Q

ADF

A

Automatic Document Feeder
feature in printers that takes several pages at once and feeds them in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ARM

A

Advanced RISC machine
company that makes CPUs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ATA

A

Advanced Tech Attachment
standard physical interface for connecting storage devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ATM

A

Asynchronous Transfer Mode
standard for internet traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AUP

A

Acceptable Use Policy
rules applied by admin for corporate and educational internet use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CDFS

A

Compact Disk File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CDMA

A

Code Division Multiple Access
channel access method for radio waves, allows several users to share a band of frequencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CIFS

A

Common Internet File System
Online file sharing. Like SMB and not used all that often.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CRL

A

Certificate of Revocation List
list of website certificates that have expired & can’t be trusted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DDoS

A

Distributed Denial of Services
attack on server by flooding it with traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DKIM

A

Domain Keys Identified Mail
digital signature for email, like needing signature for receiving mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DMA

A

Direct Memory Access
certain hardware is able to access the memory by itself without the CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DMARC

A

Domain Based Message Authentication, Reporting, & Conformance
builds on DKIM protocols, protects from fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DoS

A

Denial of Services
attack on server to make it unavailable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EFS

A

Encrypting File Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

EMI

A

Electromagnetic Interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

EULA

A

End User License Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

FSB

A

Front Side Bus
carries data between CPU and memory controller hub AKA northbridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

GFS

A

Grandfather Father Son
longterm retention policy, backup memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

GPT

A

GUID Partition Table
standard layout for storage devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

GSM

A

Global System for Mobile Communications
alternative to CDMA. GSM uses SIM cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

HAL

A

Hardware Abstraction Layer
bootcode like stuff that provides programming that allows the OS to interact with hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

HAV

A

Hardware Assisted Virtualization
full virtualization using help from hardware from host processors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

HCL

A

Hardware Compatibility List
database of hardware models and their compatibility with a certain operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
HDCP
High Bandwidth Digital Content Protection
26
HSM
Hardware Security Module device that safeguards and manages secrets, performs encryption and decryption functions
27
ICR
Intelligent Character Recognition used to extract handwritten text from image
28
IDE
Integrated Drive Electronics parallel ATA, standard interface for connecting a motherboard to storage devices such as hard drives and CD-ROM/DVD drives
29
IDS
Intrusion Detection System device or software application that monitors a network or systems for malicious activity or policy violations
30
IOPS
Input Output Operations per Second performance measurement used to characterize computer storage devices like hard disk drives, solid state drives, and storage area networks
31
IPS
Intrusion Prevention System monitors a network or systems for malicious activity or policy violations
32
IPSec
Internet Protocol Security secure network protocol suite that authenticates and encrypts packets of data
33
IrDA
Infrared Data Association provides specifications for a complete set of protocols for wireless infrared communications
34
IRP
Incident Response Plan document that outlines an organization's procedures, steps, and responsibilities of its incident response program
35
ISO
International Organization for Standardization
36
ITX
Information Technology Extended small motherboard form factor
37
KB
Knowledge Base self-serve online library of information about a product, service, department, or topic
38
KVM
Keyboard Video Mouse hardware device that allows a user to control multiple computers from one or more sets of keyboards, video monitors, and mice
39
LC
Lucent Connector fiber optic connector
40
MFD
Multifunction Device office machine that prints, copies, blah blah blah
41
MMC
Microsoft Management Console provides system administrators and advanced users an interface for configuring and monitoring the system
42
MOU
Memorandum of Understanding a contract
43
MSDS
Material Safety Data Sheet
44
MSRA
Microsoft Remote Assistance based on RDP
45
MX
Mail Exchange indicates how mail should be transferred according to SMTP
46
NAC
Network Access Control process of restricting unauthorized users and devices from gaining access to a corporate or private network
47
NTFS
New Technology File System proprietary journaling file system developed by Microsoft
48
OCR
Optical Character Recognition process that converts an image of text into a machine-readable text
49
PE
Preinstallation Environment lightweight version of Windows
50
PII
Personally Identifiable Information
51
PKI
Public Key Infrastructure governs the issuance of digital certificates to protect sensitive data, provide unique digital identities for users
52
PPP
Point to Point Protocol TCP/IP protocol that is used to connect one computer system to another
53
RADIUS
Remote Authentication Dial-in User Service networking protocol that provides centralized authentication, authorization, and accounting
54
RMM
Remote Monitoring and Management process of supervising and controlling IT systems by means of locally installed agents that can be accessed by a management service provider
55
RTO
Recovery Time Objective the maximum acceptable time that an application, computer, network, or system can be down after an unexpected disaster, failure, or comparable event takes place
56
SAS
Serial Attached SCSI (small computer system interface) point-to-point serial protocol that moves data to and from computer-storage devices such as hard disk drives and tape drives
57
SC
Subscriber Connector fiber optic connector
58
SCADA
Supervisory Control and Data Acquisition ability to perform a supervisory operation over a variety of other proprietary devices (in manufacturing field)
59
SCP
Secure Copy Protection process of protecting files and folders from being copied without proper authorization to any device in the same network
60
SCSI
Small Computer System Interface cable
61
SDN
Software Defined Networking
62
SIMM
Single Inline Memory Module
63
SPF
Sender Policy Framework email authentication method that helps to identify the mail servers that are allowed to send email for a given domain
64
SQL
Structured Query Language programming language for storing and processing information in a relational database
65
SSO
Single Sign On authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems
66
ST
Straight Tip
67
STP
Shielded Twisted Pair
68
TACACS
Terminal Access Controller Access-Control System a security protocol that provides centralized validation of users who are attempting to gain access to a router or NAS
69
TFTP
Trivial File Transfer Protocol
70
TPM
Trusted Platform Module international standard for a secure cryptoprocessor
71
UAC
User Account Control windows feature
72
UNC
Universal Naming Convention a network resource name for a share point on a workstation
73
UPnP
Universal Plug & Play networking protocols that permits networked devices, such as personal computers, printers, Internet gateways, Wi-Fi access points and mobile devices to seamlessly discover each other's presence on the network and establish functional network services
74
UPS
Uninterruptible Power Supply provide backup power, protecting equipment from damage in the event of grid power failure
75
UTM
Unified Threat Management when multiple security features or services are combined into a single device within your network
76
UTP
Unshielded Twisted Pair
77
VDI
Virtual Desktop Infrastructure
78
WMN
Wireless Mesh Network
79
XSS
Cross-site Scripting type of injection, in which malicious scripts are injected into otherwise benign and trusted websites